Description
Check Point FireWall-1 SecuRemote/SecuClient 4.0 and 4.1 allows clients to bypass the "authentication timeout" by modifying the to_expire or expire values in the client's users.C configuration file.
Products
- Check Point VPN 1 4.1
- Check Point VPN 1 4.1 SP1
- Check Point VPN 1_4.1 SP2
- Check Point VPN 1_4.1 SP3
- Check Point VPN 1_4.1 SP4
- Checkpoint Firewall-1 4.0
- Check Point Firewall-1 4.0 Service Pack 1
- Check Point Firewall-1 4.0 Service Pack 2
- Check Point Firewall-1 4.0 Service Pack 3
- Check Point Firewall-1 4.0 Service Pack 4
- Check Point Firewall-1 4.0 Service Pack 5
- Check Point Firewall-1 4.0 Service Pack 6
- Check Point Firewall-1 4.0 Service Pack 7
- Check Point Firewall-1 4.0 Service Pack 8
- Checkpoint Firewall-1 4.1
- Checkpoint Firewall-1 1 4.1 SP1
- Checkpoint Firewall-1 1 4.1 SP2
- Checkpoint Firewall-1 1 4.1 SP3
- Checkpoint Firewall-1 1 4.1 SP4
- Checkpoint Firewall-1 1 4.1 SP5
- Checkpoint Firewall-1 4.1 SP5a
- Checkpoint Firewall-1 4.1 SP6
- Check Point Next Generation
- Checkpoint Next Generation
Questions to Ask Vendors
- Can you confirm whether your systems are affected by CVE-2002-0428, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2002-0428 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions
- Check out the advisory links provided below.
References